Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 89

Full-Text Articles in Physical Sciences and Mathematics

Form Auto Generation: An Analysis Of Gui Generation, Jedadiah Mcfarland Aug 2023

Form Auto Generation: An Analysis Of Gui Generation, Jedadiah Mcfarland

Theses/Capstones/Creative Projects

Graphical User Interfaces (GUIs) have transformed how we interact with computers, offering visually appealing and intuitive systems. This paper explores the origins and evolution of GUIs, explicitly focusing on form auto-generation in modern GUI-driven environments. Form auto-generation has emerged as a prominent practice, enabling automatic form creation based on predefined models. To better understand form auto-generation, I investigate SurveyJS, an open-source form auto-generation library known for its active development and support. This investigation aims to understand how SurveyJS recognizes and renders objects from a JSON model. The methodology involves a trial and error examination of the library, exploring its live …


Artificial: A Study On The Use Of Artificial Intelligence In Art, Hayden Ernst May 2023

Artificial: A Study On The Use Of Artificial Intelligence In Art, Hayden Ernst

Theses/Capstones/Creative Projects

In the past three to five years there have been significant improvements made in AI due to improvements in computing capacity, the collection and use of big data, and an increase in public interest and funding for research. Programs such as ChatGPT, DALL•E, and Midjourney have also gained tremendous popularity in a relatively short amount of time. This led me to this project in which I aimed to gain a deeper understanding of these art generator AI and where they fit into art as a whole. My goal was to give recommendations to museums and exhibits in Omaha on what …


An Application Risk Assessment Of Werner Enterprises, Nathan Andres May 2023

An Application Risk Assessment Of Werner Enterprises, Nathan Andres

Theses/Capstones/Creative Projects

Risk assessments provide a systematic approach to identifying potential risks that could negatively impact an organization’s operations, financial performance, and reputation. Using a risk assessment, companies can evaluate potential risks and vulnerabilities, prioritize them based on their potential impact, and develop strategies to manage and address these risks effectively.

Werner Enterprises Inc. is a nationally known trucking company headquartered in Omaha, Nebraska. Our cybersecurity capstone project motivation was to partner with Werner to produce an assessment of known application risks in a functional way that can be repeated for all of Werner’s applications. To achieve this, we created a risk …


Predicting The Pebcak: A Quantitative Analysis Of How Cybersecurity Education, Literacy, And Awareness Affect Individual Preparedness., Annie Goodman May 2023

Predicting The Pebcak: A Quantitative Analysis Of How Cybersecurity Education, Literacy, And Awareness Affect Individual Preparedness., Annie Goodman

Theses/Capstones/Creative Projects

This essay explores the relationship between individuals' cybersecurity education, literacy, awareness, and preparedness. While cybersecurity is often associated with complex hacking scenarios, the majority of data breaches and cyber-attacks result from individuals inadvertently falling prey to phishing emails and malware. The lack of standardized education and training in cybersecurity, coupled with the rapid expansion of technology diversity, raises concerns about individuals' cybersecurity preparedness. As individuals are the first line of defense and the weakest link in cybersecurity, understanding the influence of education, literacy, and awareness on their adherence to best practices is crucial. This work aims to survey a diverse …


The State And Use Of Virtual Tutors, Thomas Anthone May 2023

The State And Use Of Virtual Tutors, Thomas Anthone

Theses/Capstones/Creative Projects

Virtual tutoring is the process by which students and teachers participate in the learning experience in an online, virtual, or networked environment. This process can not only separate the participants from each other in a physical space, but it can also separate them by time. Virtual tutoring can take the form of the group of students coming together synchronously in an online setting and receiving lessons from a single tutor, or by asynchronous learning in which the teacher pre-plans lessons in advance that the students consume on their own time. The advent of online learning technologies and virtual learning environments …


Obstacles In Learning Algorithm Run-Time Complexity Analysis, Bailey Licht Dec 2022

Obstacles In Learning Algorithm Run-Time Complexity Analysis, Bailey Licht

Theses/Capstones/Creative Projects

Algorithm run-time complexity analysis is an important topic in data structures and algorithms courses, but it is also a topic that many students struggle with. Commonly cited difficulties include the necessary mathematical background knowledge, the abstract nature of the topic, and the presentation style of the material. Analyzing the subject of algorithm analysis using multiple learning theories shows that course materials often leave out key steps in the learning process and neglect certain learning styles. Students can be more successful at learning algorithm run-time complexity analysis if these missing stages and learning styles are addressed.


Collaborcrack: A Collaborative Password Cracking Solution For Windows Penetration Testing, Andrew Griess Dec 2021

Collaborcrack: A Collaborative Password Cracking Solution For Windows Penetration Testing, Andrew Griess

Theses/Capstones/Creative Projects

Cybersecurity professionals attempt to crack password hashes during penetration tests to determine if they are strong enough. A password hash is a way to encode a password securely. This paper describes a proof-of-concept program called CollaborCrack, a team-based password cracking solution. CollaborCrack addresses the issues of computational complexity, remote cracking security, duplication of work, and the cost associated with password cracking. To address computational complexity, CollaborCrack enables remote password cracking. Remote cracking requires additional safeguards, which CollaborCrack mitigates by storing sensitive information locally. To reduce the duplication of work, CollaborCrack provides a shared interface designed around collaboration and teamwork. CollaborCrack …


Transitioning From Vue 2 To Vue 3, Adele Kanley Aug 2021

Transitioning From Vue 2 To Vue 3, Adele Kanley

Theses/Capstones/Creative Projects

Frontend development is a field that is constantly changing because of the vast amounts of tools that are made available each year. One of the most popular frameworks being utilized to create fluid user experience is the Vue framework. Branching from the well-known Angular.js, Vue.js is an independent open-source project that is making its mark in the user interface community.

Regardless of the popularity of a framework, updates are inevitable to keep up with the innovations required by the IT Field. To ensure that UNO IS&T students are being offered opportunities to learn and develop in the most update to …


Evolving Efficient Floor Plans For Hospital Emergency Rooms, Alex Ramsey May 2021

Evolving Efficient Floor Plans For Hospital Emergency Rooms, Alex Ramsey

Theses/Capstones/Creative Projects

Genetic Algorithms find wide use in optimization problems across many fields of research, including crowd simulation. This paper proposes that genetic algorithms could be used to create better floor plans for hospital emergency rooms, potentially saving critical time in high risk situations. The genetic algorithm implemented makes use of a hospital-specific crowd simulation to accurately evaluate the effectiveness of produced layouts. The results of combining genetic algorithms with a crowd simulation are promising. Future work may improve upon these results to produce better, more optimal hospital floor plans.


Visual Analysis Of Historical Lessons Learned During Exercises For The United States Air Force Europe (Usafe), Samantha O'Rourke May 2021

Visual Analysis Of Historical Lessons Learned During Exercises For The United States Air Force Europe (Usafe), Samantha O'Rourke

Theses/Capstones/Creative Projects

Within the United States Air Force, there are repeated patterns of differences observed during exercises. After an exercise is completed, forms are filled out detailing observations, successes, and recommendations seen throughout the exercise. At the most, no two reports are identical and must be analyzed by personnel and then categorized based on common themes observed. Developing a computer application will greatly reduce the time and resources used to analyze each After Action Report. This application can visually represent these observations and optimize the effectiveness of these exercises. The visualization is done through graphs displaying the frequency of observations and recommendations. …


Extended Functionalities For Automating Comic Book Pull Files, Jackson Cunningham Dec 2020

Extended Functionalities For Automating Comic Book Pull Files, Jackson Cunningham

Theses/Capstones/Creative Projects

This Honors Thesis project involves programming additional features for a Java application developed as a team for the UNO Computer Science Capstone Project. The purpose of this Capstone project was to develop an updated Pull File system for Dragon’s Lair Comics & Games, which has been running an outdated system in need of improvement. The pull file is an organizational system used by customers to reserve new issues of specific on-going comic book series as they are released. The comic book store can use a pull file system to maintain records of customers, store inventory, and order requests, gaining important …


Comparative Analysis Of Metabolic Pathways Of Bacteria Used In Fermented Food, Keanu Hoang, Kiran Bastola May 2020

Comparative Analysis Of Metabolic Pathways Of Bacteria Used In Fermented Food, Keanu Hoang, Kiran Bastola

Theses/Capstones/Creative Projects

This study presents a novel methodology for analyzing metabolic pathways. Utilizing KEGG REST API through a Biopython package and file parser, data about whether or not a bacteria has an enzyme or not was extracted. The results found that differences in metabolic pathway enrichment values follow along the lines of genera and pathway type. In particular, bacteria found in food spoilage and commercial nitrogen fixing products had high values of enrichment.


Grounding Size Predictions For Answer Set Programs, Nicholas Hippen Dec 2019

Grounding Size Predictions For Answer Set Programs, Nicholas Hippen

Student Work

Answer set programming is a declarative programming paradigm geared towards solving difficult combinatorial search problems. Logic programs under answer set semantics can typically be written in many different ways while still encoding the same problem. These different versions of the program may result in diverse performances. Unfortunately, it is not always easy to identify which version of the program performs the best, requiring expert knowledge on both answer set processing and the problem domain. More so, the best version to use may even vary depending on the problem instance. One measure that has been shown to correlate with performance is …


Grant Anon Minigames Extension, Justin Robbins May 2019

Grant Anon Minigames Extension, Justin Robbins

Theses/Capstones/Creative Projects

The Grant Anon system was designed to be a casualized version of the real-time strategy genre, a genre usually known for its difficulty and competitiveness because of Starcraft II, the most popular game in the genre. Grant Anon was designed as part of a capstone project, and this report details the extension that was created to add an additional element designed to make it easier for any player to enjoy Grant Anon: minigames. These minigames serve to reduce the skill needed to participate effectively in Grant Anon. This is accomplished by providing an alternative means of gaining an advantage over …


Cooperative Signaling Behavior: Signals For Open Source Project Health, Georg John Peter Link May 2019

Cooperative Signaling Behavior: Signals For Open Source Project Health, Georg John Peter Link

Information Systems and Quantitative Analysis Theses, Dissertations, and Student Creative Activity

The core contribution is a critique of signaling theory from investigating cooperative signaling behavior in the context of organizational engagement with open source projects. Open source projects display signals of project health which are used by organizations. Projects and organizations engage in cooperative signaling behavior when they work together to create signals. Signaling theory is critiqued in the cooperative context of organizational engagements with open source projects by describing how cooperative signaling behavior occurs in three processes: identifying, evaluating, and filtering new signals. The contribution is informed through engaged field research and interviews, which are presented as a thick description …


Processing Narratives By Means Of Action Languages, Craig Olson May 2019

Processing Narratives By Means Of Action Languages, Craig Olson

Computer Science Theses, Dissertations, and Student Creative Activity

In this work we design a narrative understanding system Text2ALM that can be used in Question Answering domains. System Text2ALM utilizes an action language 𝒜ℒℳ to perform inferences on complex interactions of events described in narratives. The methodology that Text2ALM follows in its implementation was originally outlined by Yuliya Lierler, Daniela Inclezan, and Michael Gelfond in 2017 via a manual process, and this work serves as a proof of concept in a large-scale environment. Our system automates the conversion of a narrative to an 𝒜ℒℳ model containing facts about the narrative. We make use of the VerbNet lexicon that we …


Phr: Patient Health Record, Quinn Nelson Dec 2018

Phr: Patient Health Record, Quinn Nelson

Theses/Capstones/Creative Projects

The rapid development of information technology systems has expanded into multiple disciplines and results in systems that are limited by initial design and implementation: the Healthcare Information Technology (HIT) space is no different. The introduction of the Electronic Health Record (EHR) system has changed the way healthcare operates. Initial designs of these systems were focused on serving the needs of insurance companies and healthcare billing departments. Research shows that the design of EHR systems negatively impact provider-patient interactions and the care they receive. This capstone project capitalizes on the collaboration efforts between UNO and UNMC – by joining a research …


Multi-Label Classification Using Higher-Order Label Clusters, Dilanga Lakshitha Bandara Abeyrathna Galapita Mudiyanselage Dec 2018

Multi-Label Classification Using Higher-Order Label Clusters, Dilanga Lakshitha Bandara Abeyrathna Galapita Mudiyanselage

Student Work

Multi-label classification (MLC) is one of the major classification approaches in the context of data mining where each instance in the dataset is annotated with a set of labels. The nature of multiple labels associated with one instance often demands higher computational power compared to conventional single-label classification tasks. A multi-label classification is often simplified by decomposing the task into single-label classification which ignores correlations among labels. Incorporating label correlations into classification task can be hard since correlations may be missing, or may exist among a pair or a large subset of labels. In this study, a novel MLC approach …


An Investigation Into The Imposed Cognitive Load Of Static & Dynamic Type Systems On Programmers, Ian Vaughn Koeppe Nov 2018

An Investigation Into The Imposed Cognitive Load Of Static & Dynamic Type Systems On Programmers, Ian Vaughn Koeppe

Student Work

Static and dynamic type systems have long been a point of contention in the programming language wars. Yet, for many years, arguments on either side were drawn from personal experience and not empirical evidence. A challenge for researchers is that the usability of language constructs is difficult to quantify, especially since usability can be interpreted in many ways. By one definition, language usability can be measured in terms of the level of cognitive load imposed on a developer. This can be done through questionnaires, but ultimately user responses are subject to bias. In recent years, eye-tracking has been shown to …


Predicting User Interaction On Social Media Using Machine Learning, Chad Crowe Nov 2018

Predicting User Interaction On Social Media Using Machine Learning, Chad Crowe

Student Work

Analysis of Facebook posts provides helpful information for users on social media. Current papers about user engagement on social media explore methods for predicting user engagement. These analyses of Facebook posts have included text and image analysis. Yet, the studies have not incorporate both text and image data. This research explores the usefulness of incorporating image and text data to predict user engagement. The study incorporates five types of machine learning models: text-based Neural Networks (NN), image-based Convolutional Neural Networks (CNN), Word2Vec, decision trees, and a combination of text-based NN and image-based CNN. The models are unique in their use …


Cslc Tutoring Portal, Brian Hodges May 2018

Cslc Tutoring Portal, Brian Hodges

Theses/Capstones/Creative Projects

A web portal designed for the Computer Science Learning Center to track students requesting help


A Complete Coverage Algorithm For 3d Structural Inspection Using An Autonomous Unmanned Aerial Vehicle, Venkat Ramana Reddy Garlapati Dec 2017

A Complete Coverage Algorithm For 3d Structural Inspection Using An Autonomous Unmanned Aerial Vehicle, Venkat Ramana Reddy Garlapati

Student Work

This thesis presents a novel algorithm for complete coverage of three-dimensional structures to address the problem of autonomous structural inspection using an Unmanned Aerial Vehicle (UAV). The proposed approach uses a technique of cellular decomposition based on Morse decomposition to decompose the 3D target structure into 2D coverable faces that are subsequently connected using a graph-based representation. We then use graph traversal techniques such as the Traveling Salesman Problem (TSP) to generate a flight coverage path through the decomposed faces for a UAV to completely cover the target structure, while reducing the coverage time and distance. To test the validity …


Altering The Expression Of Artemisinin Through Osmotic Manipulation, Tyler Friesen Dec 2017

Altering The Expression Of Artemisinin Through Osmotic Manipulation, Tyler Friesen

Theses/Capstones/Creative Projects

Artemisinin is an anti-malarial drug used in combination therapy to treat all malarial parasites in the blood stage. The expression of artemisinin within the plant Artemisia annua is only 1% of the dry weight. Methods for increasing the level of artemisinin within the plant were proposed. This paper looks into finding homologous enzymes across multiple species in order to find species where genetic manipulations will be useful. The second part of this paper looks at the use of osmotic stress to increase the reactive oxygen species in order to increase the amount of artemisinin within the plant. The database portion …


Program Inspection And Testing Techniques For Code Clones And Refactorings In Evolving Software, Zhiyuan Chen Oct 2017

Program Inspection And Testing Techniques For Code Clones And Refactorings In Evolving Software, Zhiyuan Chen

Student Work

Developers often perform copy-and-paste activities. This practice causes the similar code fragment (aka code clones) to be scattered throughout a code base. Refactoring for clone removal is beneficial, preventing clones from having negative effects on software quality, such as hidden bug propagation and unintentional inconsistent changes. However, recent research has provided evidence that factoring out clones does not always reduce the risk of introducing defects, and it is often difficult or impossible to remove clones using standard refactoring techniques. To investigate which or how clones can be refactored, developers typically spend a significant amount of their time managing individual clone …


Tool Support For Capturing The Essence Of A Concern In Source Code, Chuntao Fu Aug 2017

Tool Support For Capturing The Essence Of A Concern In Source Code, Chuntao Fu

Student Work

Software evolves constantly to adapt to changing user needs. As it evolves, it becomes progressively harder to understand due to accumulation of code changes, increasing code size, and the introduction of complex code dependencies. As a result, it becomes harder to maintain, exposing the software to potential bugs and degradation of code quality. High maintenance costs and diminished opportunities for software reusability and portability lead to reduced return on investment, increasing the likelihood of the software product being discarded or replaced. Nevertheless, we believe that there is value in legacy software due to the amount of intellectual efforts that have …


Detection Of Comparability Subgraphs From Large Networks, Muthunagai Balakrishnamoorthy Aug 2017

Detection Of Comparability Subgraphs From Large Networks, Muthunagai Balakrishnamoorthy

Student Work

Real world large scale networks can be represented as graphs. This approach plays a key role in analysis in the domains of social networks [1] and bioinformatics [2], among others. Analyzing these networks is computationally complex and expensive, especially in terms of memory and time complexity. A popular technique subverting time and computation expense for analyzing networks is extracting substructures, which preserves more important information and less noise [12]. In this work, we use special a special substructure called comparability, which preserves transitive orientation. Our motive is to extract a maximal comparability subgraph since no algorithm exists. Our algorithm is …


Towards Student Engagement Analytics: Applying Machine Learning To Student Posts In Online Lecture Videos, Nicholas R. Stepanek May 2017

Towards Student Engagement Analytics: Applying Machine Learning To Student Posts In Online Lecture Videos, Nicholas R. Stepanek

Student Work

The use of online learning environments in higher education is becoming ever more prevalent with the inception of MOOCs (Massive Open Online Courses) and the increase in online and flipped courses at universities. Although the online systems used to deliver course content make education more accessible, students often express frustration with the lack of assistance during online lecture videos. Instructors express concern that students are not engaging with the course material in online environments, and rely on affordances within these systems to figure out what students are doing. With many online learning environments storing log data about students usage of …


Applications Of Graph Embedding In Mesh Untangling, Jake Quinn May 2017

Applications Of Graph Embedding In Mesh Untangling, Jake Quinn

Student Work

The subject of this thesis is mesh untangling through graph embedding, a method of laying out graphs on a planar surface, using an algorithm based on the work of Fruchterman and Reingold[1]. Meshes are a variety of graph used to represent surfaces with a wide number of applications, particularly in simulation and modelling. In the process of simulation, simulated forces can tangle the mesh through deformation and stress. The goal of this thesis was to create a tool to untangle structured meshes of complicated shapes and surfaces, including meshes with holes or concave sides. The goals of graph embedding, such …


Improving Software Quality By Synergizing Effective Code Inspection And Regression Testing, Bo Guo May 2017

Improving Software Quality By Synergizing Effective Code Inspection And Regression Testing, Bo Guo

Student Work

Software quality assurance is an essential practice in software development and maintenance. Evolving software systems consistently and safely is challenging. All changes to a system must be comprehensively tested and inspected to gain confidence that the modified system behaves as intended. To detect software defects, developers often conduct quality assurance activities, such as regression testing and code review, after implementing or changing required functionalities. They commonly evaluate a program based on two complementary techniques: dynamic program analysis and static program analysis. Using an automated testing framework, developers typically discover program faults by observing program execution with test cases that encode …


Algorithms For Modular Self-Reconfigurable Robots: Decision Making, Planning, And Learning, Ayan Dutta May 2017

Algorithms For Modular Self-Reconfigurable Robots: Decision Making, Planning, And Learning, Ayan Dutta

Student Work

Modular self-reconfigurable robots (MSRs) are composed of multiple robotic modules which can change their connections with each other to take different shapes, commonly known as configurations. Forming different configurations helps the MSR to accomplish different types of tasks in different environments. In this dissertation, we study three different problems in MSRs: partitioning of modules, configuration formation planning and locomotion learning, and we propose algorithmic solutions to solve these problems.

Partitioning of modules is a decision-making problem for MSRs where each module decides which partition or team of modules it should be in. To find the best set of partitions is …